2024-07-01 00:23:09,683:DEBUG:certbot._internal.main:certbot version: 1.6.0 2024-07-01 00:23:09,683:DEBUG:certbot._internal.main:Arguments: [] 2024-07-01 00:23:09,683:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot) 2024-07-01 00:23:10,522:DEBUG:certbot._internal.log:Root logging level set at 20 2024-07-01 00:23:10,523:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log 2024-07-01 00:23:10,559:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04D31E90> and installer <certbot._internal.cli.cli_utils._Default object at 0x04D31E90> 2024-07-01 00:23:10,604:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:23:10,632:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:23:10,649:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer. 2024-07-01 00:23:10,654:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD 2024-07-01 00:23:10,662:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC. 2024-07-01 00:23:10,662:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:23:10,663:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:23:10,668:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D31290> Prep: True 2024-07-01 00:23:10,669:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D31290> and installer None 2024-07-01 00:23:10,669:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:23:10,675:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:23:10,676:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:23:10,679:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:23:11,170:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:23:11,170:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:08 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "vuYIE_RKp8k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-01 00:23:11,171:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:23:16,366:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8079_key-certbot.pem 2024-07-01 00:23:21,056:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8077_csr-certbot.pem 2024-07-01 00:23:21,057:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:23:21,057:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:23:21,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:23:21,213:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:18 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkVbbJsEe2q33-xvrA3izusAH27iS3wI1deADVFvX9lxc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:23:21,214:DEBUG:acme.client:Storing nonce: qqMiT6CkVbbJsEe2q33-xvrA3izusAH27iS3wI1deADVFvX9lxc 2024-07-01 00:23:21,214:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai-image.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:23:21,221:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tWYmJKc0VlMnEzMy14dnJBM2l6dXNBSDI3aVMzd0kxZGVBRFZGdlg5bHhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "a6VBSbCKbeouRAGmaWhOu3slxmabPNvupbJbR8OIh5g4JO1WYZlrGug5aAZnXOWjSYHY9mXwJrqbdIS-_35BVOLAEQUBQloUwSw2u9FnsV8-YN8cTZMHpPJwzkCIAJ8l8_uSxTGv-OnruVIDtxYueAsFatxPwFmO_zr8xFd9fn3tT_nI8twhAQM47D7axteFky7ty2b1u7TUjkMqzMa2XXG_xIn1wavZfWfU8aTgGia8G-CmnfjmqOKCPwY4xwKKkYeFPmTQdZiOos9ck3OmoLaDHmsmqaKpOfcvziTY0zNo0zpj22cLBgCEO06VO8QGFUuWox34gVu9iMHcRBQ5Dg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-01 00:23:21,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-01 00:23:21,395:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:23:18 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037 Replay-Nonce: qqMiT6CkKIddoG_OUqAYiZnrwgy1xbgY-JxC3RiFNTQ3YLG5iXs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:00:50Z", "identifiers": [ { "type": "dns", "value": "ai-image.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037" } 2024-07-01 00:23:21,395:DEBUG:acme.client:Storing nonce: qqMiT6CkKIddoG_OUqAYiZnrwgy1xbgY-JxC3RiFNTQ3YLG5iXs 2024-07-01 00:23:21,396:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:23:21,403:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tLSWRkb0dfT1VxQVlpWm5yd2d5MXhiZ1ktSnhDM1JpRk5UUTNZTEc1aVhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ", "signature": "x_Dw7TztMcRRdmQUesfMwwZRI9gVzeMYqbzbePU5xymTU3rvl1G_7oJ7sWAGyLNX14icAtikFeO07KWPGZSjDqC_ebQ3pB-Gg2j4OJfxDPUKCDSNRMdM_SkpTZW9t5sQ4MRoy2rnG6rksUuWK9WU4q6RhMgxxB_-CMoT7E-P53B3oa4wD6LicOPFqGJfO-wy8RiOT6ecVqyTH7VPtaddbuVl5nBSuyZuWiSD9oqhL3R0hbCVcX5pzb9Qh8nv5N7epMUpORljMFsIm3xPnGWWHRPtOt5M0wcsRdSmzjhBf6hyd-HBgGOI1bVlEB5GUii3kLgBIBuy9CDPyfaaIw7xJQ", "payload": "" } 2024-07-01 00:23:21,564:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810 2024-07-01 00:23:21,565:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:19 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0OkMx-qtLBVD6GK8QHamURLXuE-zr9J05vPwVaASYnbY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai-image.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:00:50Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA", "status": "pending", "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ" } ] } 2024-07-01 00:23:21,565:DEBUG:acme.client:Storing nonce: jqVAJFJ0OkMx-qtLBVD6GK8QHamURLXuE-zr9J05vPwVaASYnbY 2024-07-01 00:23:21,565:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:23:21,566:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl 2024-07-01 00:23:21,566:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:23:21,567:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:23:21,581:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:23:21,581:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:23:21,582:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:23:21,582:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:23:21,588:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:23:21,631:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:23:21,676:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:23:21,677:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-01 00:23:21,678:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-01 00:23:21,683:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC. 2024-07-01 00:23:21,683:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:23:21,684:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:23:21,688:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D31290> Prep: True 2024-07-01 00:23:21,688:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D31290> and installer None 2024-07-01 00:23:21,689:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:23:21,694:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:23:21,695:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:23:21,697:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:23:22,152:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:23:22,153:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:19 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "tDn0t893RGw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-01 00:23:22,154:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:23:26,717:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8080_key-certbot.pem 2024-07-01 00:23:31,161:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8078_csr-certbot.pem 2024-07-01 00:23:31,162:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:23:31,162:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:23:31,315:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:23:31,315:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:28 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCG0q6wmAwlCPN-U2J0z3b5mekACyZw6Sl5Ejerh61T14 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:23:31,315:DEBUG:acme.client:Storing nonce: B-hK_YLCG0q6wmAwlCPN-U2J0z3b5mekACyZw6Sl5Ejerh61T14 2024-07-01 00:23:31,316:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "ai.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:23:31,322:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENHMHE2d21Bd2xDUE4tVTJKMHozYjVtZWtBQ3ladzZTbDVFamVyaDYxVDE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "dLB_J-_MVrEAJbJMy5L34eetQgIepAZ3L5OVuz3sOlyF8e0gXg_uteZqGnjaS3kTdfvMUU9sKsDwmMh2nyvuYzuPxv40hs3UKMFJbVeez1wdmSpxWZJ0WbB4yemgvaM_yIfuS_Hn0fC5RoiK8rF77a8mQzObhL2ubheP4Zi1M4I-5pvIiO3s-5eLd145nZmm_kcWo8lWtC7O4FbnIiElYg5nNigZLsp3KMyxXX-K9M-qDPziKoRDfqDg4KoBall7NV2FrcPmRvqfZC2ETCu814xjQFvEaeL5u3qesgFfqabsROeqbI1-MkTrstMruXbDQy6rYWo7IX625mmiaSbW2w", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-01 00:23:31,487:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344 2024-07-01 00:23:31,488:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:23:29 GMT Content-Type: application/json Content-Length: 344 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847 Replay-Nonce: B-hK_YLCn5ImLnNgRIFmzHHJUMiCuRkLzKfXS_GKaXnfyPG1o80 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:01Z", "identifiers": [ { "type": "dns", "value": "ai.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847" } 2024-07-01 00:23:31,488:DEBUG:acme.client:Storing nonce: B-hK_YLCn5ImLnNgRIFmzHHJUMiCuRkLzKfXS_GKaXnfyPG1o80 2024-07-01 00:23:31,488:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:23:31,494:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENuNUltTG5OZ1JJRm16SEhKVU1pQ3VSa0x6S2ZYU19HS2FYbmZ5UEcxbzgwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ", "signature": "JUtMZEDlPYaCENhfU0_7VqZc5FcQVKv0ogFvQOEvEzPmRDorxTD2o-w2EqBNeLgDfNFBEUr1M5q60a3jNcohwxYzd2cIe8Y6gksEuSeUEmrFJMrzquxjsfllq-XgPwWUiXNkYM7HEzhY9Bara4jWFFMsVNmhhHf__53Lo2RD8abgJlJI_RHBBdcNBNHN3gjMsYMJkLRvEcFFDITzC9fTWYKVGBeQp_t-0x_7fJ8EM7YuQlwQ2hcpZzpVJ-sia-N_7NmOI63hj6nwIfdmyjiFEQnUw1NIeWGaa2Ju2wU8NHTL1c-v2NM5ID97yzjVoua_7JKWmSKPNPDWz_FV89PVCQ", "payload": "" } 2024-07-01 00:23:31,650:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804 2024-07-01 00:23:31,651:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:29 GMT Content-Type: application/json Content-Length: 804 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9TcFrSmkpfNs436MWXPsfxBoX9KTTHZS_oRxFvbeM-14 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "ai.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w", "status": "pending", "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ" } ] } 2024-07-01 00:23:31,651:DEBUG:acme.client:Storing nonce: eF-2qMJ9TcFrSmkpfNs436MWXPsfxBoX9KTTHZS_oRxFvbeM-14 2024-07-01 00:23:31,651:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:23:31,652:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl 2024-07-01 00:23:31,652:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:23:31,652:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:23:31,653:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:23:31,653:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:23:31,653:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:23:31,654:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:23:31,655:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:23:31,710:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:23:31,918:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:23:31,920:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-01 00:23:31,920:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-01 00:23:31,925:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC. 2024-07-01 00:23:31,926:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:23:31,926:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:23:31,931:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0476FA70> Prep: True 2024-07-01 00:23:31,932:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0476FA70> and installer None 2024-07-01 00:23:31,932:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:23:31,937:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:23:31,937:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:23:31,940:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:23:32,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:23:32,373:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:29 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "m-TiETDW_Qk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:23:32,374:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:23:37,068:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8081_key-certbot.pem 2024-07-01 00:23:41,525:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8079_csr-certbot.pem 2024-07-01 00:23:41,526:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:23:41,526:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:23:41,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:23:41,673:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:39 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9DzesE-4H90Txb08F2srkHTvHjxhBwDCd8udpk7nxrtA X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:23:41,673:DEBUG:acme.client:Storing nonce: eF-2qMJ9DzesE-4H90Txb08F2srkHTvHjxhBwDCd8udpk7nxrtA 2024-07-01 00:23:41,674:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "aslan.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:23:41,680:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlEemVzRS00SDkwVHhiMDhGMnNya0hUdkhqeGhCd0RDZDh1ZHBrN254cnRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aYkxaqzbCHjZRgaifgL4vrYKYY-6nsNvZMm74C0L9A8yG_A_BATg5-ypBRdD0pEJQx4VuFoSRDPds8UEjlkcnJhBDQ1fFGgkp9L49KwHmqVtfY2LdNl5oCttv4XrkqNelfI_IDYRshuTvWfVMoTPCHxnWaXYUe_vKQ_JIrH9dOAKDZZfzm91-UlyYBdzT9BkRAWaidG68llasc4AzvmH85vM83ugfVMgqms89n_npcxtw8vuqsuk0oyNbmp0m3Xc_xH53TIUhkqzzY-bc8vEMV3A-X_RctlJL2tUKpW4KcY2Ot8keVLnRzqGaoPvbh1ZjZmBXJT6Qtf4Vk7z4J8vnw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-01 00:23:41,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347 2024-07-01 00:23:41,844:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:23:39 GMT Content-Type: application/json Content-Length: 347 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467 Replay-Nonce: B-hK_YLCfRUpy4i_T8RbsxppmIIfLoHot1aYWz0xZBUG8mbopJY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:11Z", "identifiers": [ { "type": "dns", "value": "aslan.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467" } 2024-07-01 00:23:41,845:DEBUG:acme.client:Storing nonce: B-hK_YLCfRUpy4i_T8RbsxppmIIfLoHot1aYWz0xZBUG8mbopJY 2024-07-01 00:23:41,845:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:23:41,851:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENmUlVweTRpX1Q4UmJzeHBwbUlJZkxvSG90MWFZV3oweFpCVUc4bWJvcEpZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ", "signature": "ZGI1vLFPXJDbyprqCAxb8LSURVyOXFlaeu1jqBjF-0GY-ayYQdOcEqxIDxoen1ViJcnC0QbOy0LOlRU0PBiJfFwMeCMWt-lvun41-Azuvup5bpika_41ibZrwmcrgQCgwjqp951i3jAQ9O_gk1mPejVkh_WSsTVJ3T-0vHVCMm39F8xqCOQM4F4Z0owSlMmljbmy9TG9K7rWRsufe3pGxUJUXuptEezFdHBVcrDEBrQYgA0i_ExxB-0EAKBG1PrvCnIhikh0k04uR53bdOE_42bYTzZqWUovTsnSS9PBHaszmJ-gRlgUsibMrzmPDvQxv_jrtzHu_jFPfPCxkiGHuw", "payload": "" } 2024-07-01 00:23:42,015:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807 2024-07-01 00:23:42,016:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:39 GMT Content-Type: application/json Content-Length: 807 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9AC14dOLYy-BeVp6nhWWrGi39LJV5qik_KKYcKYFwtqY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "aslan.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:11Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ", "status": "pending", "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs" } ] } 2024-07-01 00:23:42,016:DEBUG:acme.client:Storing nonce: eF-2qMJ9AC14dOLYy-BeVp6nhWWrGi39LJV5qik_KKYcKYFwtqY 2024-07-01 00:23:42,017:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:23:42,017:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl 2024-07-01 00:23:42,018:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:23:42,018:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:23:42,019:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:23:42,019:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:23:42,019:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:23:42,019:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:23:42,021:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:23:42,074:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:23:42,268:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:23:42,269:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-01 00:23:42,270:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-01 00:23:42,275:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC. 2024-07-01 00:23:42,275:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:23:42,276:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:23:42,283:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D310B0> Prep: True 2024-07-01 00:23:42,283:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D310B0> and installer None 2024-07-01 00:23:42,283:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:23:42,289:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:23:42,290:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:23:42,292:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:23:42,780:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:23:42,780:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:40 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "umWjZYHWfEs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-01 00:23:42,781:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:23:47,590:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8082_key-certbot.pem 2024-07-01 00:23:52,221:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8080_csr-certbot.pem 2024-07-01 00:23:52,221:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:23:52,221:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:23:52,384:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:23:52,385:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:49 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ08BMyE-AG27GT1vDfhIKaoichvE9yHvjL7yHuVyorfRQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:23:52,385:DEBUG:acme.client:Storing nonce: jqVAJFJ08BMyE-AG27GT1vDfhIKaoichvE9yHvjL7yHuVyorfRQ 2024-07-01 00:23:52,386:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:23:52,392:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjA4Qk15RS1BRzI3R1QxdkRmaElLYW9pY2h2RTl5SHZqTDd5SHVWeW9yZlJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "gDl5e7U-SZetY1cD9MgYMiKz5KyQkHjzV88hJVHwL2GPeqPYQ5yaTEKD3J_ISjBb0FzjqplTrkpQmK_yHz1f7wKQmn_BEpDZvoUEu8rLhtMsK7ELzznGa8ijKXlNIhjaWvrJZsXkPbiXWK-85_nDOXF7rNhKwmM-ZXID7b0c7hyynswuiwxaFB-8cxILvxC4oSj5eZnlc5F7Qp0tjWs9W0Z-jQeo3WJkCj4qffzz2ja_84pC9wlV3CvRvjrxpatas0UX0GyJW2zlq3ywNnkAk72xfkkp1Aie9v7bE0kooxsXwPKyQ28SUzsni9JkIClZbSAQFD032jIQkcpz84rxNg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-01 00:23:52,637:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341 2024-07-01 00:23:52,638:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:23:50 GMT Content-Type: application/json Content-Length: 341 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497 Replay-Nonce: qqMiT6CkEoj19cFeBeTtCiMYxDXXVUZRTdGoHo2tvS0yf3Sbaf4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:21Z", "identifiers": [ { "type": "dns", "value": "daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497" } 2024-07-01 00:23:52,638:DEBUG:acme.client:Storing nonce: qqMiT6CkEoj19cFeBeTtCiMYxDXXVUZRTdGoHo2tvS0yf3Sbaf4 2024-07-01 00:23:52,638:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:23:52,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tFb2oxOWNGZUJlVHRDaU1ZeERYWFZVWlJUZEdvSG8ydHZTMHlmM1NiYWY0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ", "signature": "i22_vD0FG3RqFCGxdP6myxOQgYs3WvPQLeE0hm5t6-YSllhw05ROOELl5do3tmDquZOmc01_qLZfaKCseIqOaQMiFqOuQlH7DFYJNZud3o9z4X-Gcg_-81jB-_cqjVzv9-34uBvrSnMavxM0KmTOEnqDJiUvDhAOgb3eRzDB-6UHfzn_6t2LOO2KmTET4cMmpD2sA8N5ZSwigvkQOC8M8gT3zplQg8d8M4CZq1ZD_QOm-JVtt0HECQZ_HbXrmjZhjmRrkLc3HrO02Ed68Tcp-LTiBoCeUklf7xkFv60bwETaqjJmyvvyb39Ez5L4mp7Oz_NAHB8ec12XfnENhkWpVg", "payload": "" } 2024-07-01 00:23:52,813:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801 2024-07-01 00:23:52,813:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:50 GMT Content-Type: application/json Content-Length: 801 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkEaO0kjoEHxUIPiJhTBqRt6ZmGGOPf2nCT7zqqsLmWdk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:21Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q", "status": "pending", "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs" } ] } 2024-07-01 00:23:52,814:DEBUG:acme.client:Storing nonce: qqMiT6CkEaO0kjoEHxUIPiJhTBqRt6ZmGGOPf2nCT7zqqsLmWdk 2024-07-01 00:23:52,814:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:23:52,815:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl 2024-07-01 00:23:52,815:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:23:52,815:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:23:52,816:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:23:52,816:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:23:52,817:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:23:52,817:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:23:52,818:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:23:52,870:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:23:52,910:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:23:52,912:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-01 00:23:52,913:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-01 00:23:52,918:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC. 2024-07-01 00:23:52,919:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:23:52,919:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:23:52,925:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D03390> Prep: True 2024-07-01 00:23:52,925:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D03390> and installer None 2024-07-01 00:23:52,925:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:23:52,930:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:23:52,931:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:23:52,932:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:23:53,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:23:53,414:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:23:50 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "8fobBLp1oyc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:23:53,415:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:23:57,989:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8083_key-certbot.pem 2024-07-01 00:24:02,473:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8081_csr-certbot.pem 2024-07-01 00:24:02,474:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:24:02,474:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:24:02,636:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:24:02,637:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:00 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0-brmLiWjSPMexK__WOnaYvUw4q4j5kK9jpEVnxgdsP0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:24:02,637:DEBUG:acme.client:Storing nonce: jqVAJFJ0-brmLiWjSPMexK__WOnaYvUw4q4j5kK9jpEVnxgdsP0 2024-07-01 00:24:02,637:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "fsp.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:24:02,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAtYnJtTGlXalNQTWV4S19fV09uYVl2VXc0cTRqNWtLOWpwRVZueGdkc1AwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "fQMh6ggjK7ONGNCuLB1xk9MAm1i669tw3LTOUzPZSD6Vkn6n7AiBMn0wndwq659ga2yKN65dbt5-RjKPOoszAHzf-_KLX5saZZbsrN7TDGX9B3BTv4C4UqmUxGL6-sgZMLXcYHOzl6YCd4F5DdC9umKIgM8AHVfVr2ovdD5y7HF9c_VEi8jnaczO-60mDtR764SmCyiuT8h63rWo9__ehpNkG_c50jghRvcookOCEtP_kwXeCGKtI_TmK52arhPRZyn1tndJQXMEKYDSZC55cbEsBBh2YdG_DU_jfkyXP9gBl6GFvQRo3nUaACCWW5ruJt543IH-BYjkLmUYxiw6rA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-01 00:24:02,821:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-01 00:24:02,822:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:24:00 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277 Replay-Nonce: jqVAJFJ0tdyHni8YQQnElVGIkX0UhQuoNsxt5_V-nj-2w0FqkAc X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:31Z", "identifiers": [ { "type": "dns", "value": "fsp.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277" } 2024-07-01 00:24:02,822:DEBUG:acme.client:Storing nonce: jqVAJFJ0tdyHni8YQQnElVGIkX0UhQuoNsxt5_V-nj-2w0FqkAc 2024-07-01 00:24:02,823:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:24:02,829:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB0ZHlIbmk4WVFRbkVsVkdJa1gwVWhRdW9Oc3h0NV9WLW5qLTJ3MEZxa0FjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ", "signature": "lppkwY03BhQjazLplj_ilSAGFocYQHPmDlBzaVUTqm_6rKZMgoZci4dcdh5jpcsh7kre1usEPYoD_aI637voEA0vd5uheIAxIBtdT_PZHud9Mfx_E2uXgCrU62kPeSF7a4SClcss1Z1T8AEszC8GPWhRPZJljri2PQWARqom5-wYDLsfo4-2G_RRdf_sN1BRDiRbV7iXbFzZGZ9X9UmBTCoX8N1TfGhFhPi0IQUEkbYJzxrbce0rb1fWJqwyMNKuxxhY_YeN6J88snyVCqnCtHvER3cFH_dxfgZlLDXz5LJWTonj4vUe8KXRhZLiUa93-8yzDY61iTCrpNSCwBTAgA", "payload": "" } 2024-07-01 00:24:02,995:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805 2024-07-01 00:24:02,995:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:00 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkqBGBI-sM8dqKndu9zEqmWBd-KLHmMl_wNwCqgIE8gi0 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "fsp.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:31Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q", "status": "pending", "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU" } ] } 2024-07-01 00:24:02,995:DEBUG:acme.client:Storing nonce: qqMiT6CkqBGBI-sM8dqKndu9zEqmWBd-KLHmMl_wNwCqgIE8gi0 2024-07-01 00:24:02,996:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:24:02,996:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl 2024-07-01 00:24:02,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:24:02,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:24:02,998:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:02,998:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:24:02,998:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:24:02,999:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:24:03,000:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:03,050:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:24:03,253:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:24:03,254:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-01 00:24:03,255:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-01 00:24:03,260:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC. 2024-07-01 00:24:03,260:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:24:03,260:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:24:03,265:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D03390> Prep: True 2024-07-01 00:24:03,266:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D03390> and installer None 2024-07-01 00:24:03,266:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:24:03,271:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:24:03,271:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:24:03,274:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:24:03,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:24:03,720:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:01 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "kTPjHD1Z4-I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:24:03,721:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:24:08,238:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8084_key-certbot.pem 2024-07-01 00:24:12,719:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8082_csr-certbot.pem 2024-07-01 00:24:12,719:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:24:12,719:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:24:12,869:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:24:12,870:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:10 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9FQOGa3PYGllNpdsrO8Iaz8WvUhKadljSzOs3esQpGBM X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:24:12,870:DEBUG:acme.client:Storing nonce: eF-2qMJ9FQOGa3PYGllNpdsrO8Iaz8WvUhKadljSzOs3esQpGBM 2024-07-01 00:24:12,870:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "galeria.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:24:12,877:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlGUU9HYTNQWUdsbE5wZHNyTzhJYXo4V3ZVaEthZGxqU3pPczNlc1FwR0JNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "NQFCwr0ildMIxkOMH1b3yeN8acm-9JvrqIoLhwYmJL7PLE7qmSziLRdmRZP7MlhasrrShQ8u3M7lNTPfR26whIF9eB1Q0wcPqWzZE-dILE9clmGci0aTZ-54JDXjj4AEATMwdh_6zEqHbvf2OuUUYSEZE1pnyvykiYZOMXawx91Pxih57tuqqlEY7YZvYrF1ZqacWNdIrnVyNiHy9-bNa29kDY2VahKs4z9nvCYYr0TytCfLIDIbbUxxNLQzunnAmLzWtSyzLE38M6Gy9owXbADIfesj4lcPGFJAp-Ff_AKXe9O6IWWHfTeTjg_008CIq6cXI6R74pyJuDsdmdOa2g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-01 00:24:13,045:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-01 00:24:13,046:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:24:10 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367 Replay-Nonce: B-hK_YLC1v9iJybCO0_E0VyZb35dYQaRW0nMAfXFdC1SvirOr_w X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:41Z", "identifiers": [ { "type": "dns", "value": "galeria.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367" } 2024-07-01 00:24:13,046:DEBUG:acme.client:Storing nonce: B-hK_YLC1v9iJybCO0_E0VyZb35dYQaRW0nMAfXFdC1SvirOr_w 2024-07-01 00:24:13,046:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:24:13,054:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMxdjlpSnliQ08wX0UwVnlaYjM1ZFlRYVJXMG5NQWZYRmRDMVN2aXJPcl93IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ", "signature": "OgoBtacNvBxhKPXW1hMrfostIsgW_sfkat9daapQjouCCnIv_H4T7ZI3hWVs3qNZW43R7NsXVI0s-L4hsTr_j6mkZdBGoSWbk4GX1lmvGYV3Dd56I4vEPWCYZkmfk8ZHG0TXCXcf8I8CBtNEb7SZW5KWst9KC1_91v-K-dwKabj-MZs9x9PArEoy97Df2E6WtObxQObBXPfUaCgQ_l5-qhTm-DABJ5lLhEA8a5OCu0-NIJOxYLSgGVxUJtSYOOfyRFyz0g293QthH-LBUddrba0oG1QbR-Q5EdwMllF0c2bHzL1hkhkabZYe4oi9liEUYAxGnu-72bmVa8bhGqkBWA", "payload": "" } 2024-07-01 00:24:13,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809 2024-07-01 00:24:13,222:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:10 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9cL4WeQkC9BcjsP6QlHRWOPlJXsKfwmTFMRsVM5plTU4 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "galeria.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:41Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g", "status": "pending", "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY" } ] } 2024-07-01 00:24:13,223:DEBUG:acme.client:Storing nonce: eF-2qMJ9cL4WeQkC9BcjsP6QlHRWOPlJXsKfwmTFMRsVM5plTU4 2024-07-01 00:24:13,223:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:24:13,224:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl 2024-07-01 00:24:13,224:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:24:13,224:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:24:13,225:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:13,225:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:24:13,225:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:24:13,226:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:24:13,227:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:13,276:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:24:13,291:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:24:13,293:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer. 2024-07-01 00:24:13,294:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD 2024-07-01 00:24:13,298:INFO:certbot._internal.renewal:Cert not yet due for renewal 2024-07-01 00:24:13,302:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:24:13,343:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:24:13,356:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:24:13,357:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-01 00:24:13,358:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-01 00:24:13,363:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC. 2024-07-01 00:24:13,363:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:24:13,363:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:24:13,368:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05029710> Prep: True 2024-07-01 00:24:13,369:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05029710> and installer None 2024-07-01 00:24:13,369:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:24:13,374:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:24:13,375:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:24:13,377:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:24:13,812:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:24:13,813:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:11 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert", "skH-afZM_Uk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417" } 2024-07-01 00:24:13,814:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:24:18,594:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8085_key-certbot.pem 2024-07-01 00:24:23,029:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8083_csr-certbot.pem 2024-07-01 00:24:23,030:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:24:23,030:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:24:23,175:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:24:23,176:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:20 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCD7grfThgdAuW1j61k7ept7cWP3SLA0Gemd9ys1_TkCk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:24:23,176:DEBUG:acme.client:Storing nonce: B-hK_YLCD7grfThgdAuW1j61k7ept7cWP3SLA0Gemd9ys1_TkCk 2024-07-01 00:24:23,177:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "inne.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:24:23,183:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENEN2dyZlRoZ2RBdVcxajYxazdlcHQ3Y1dQM1NMQTBHZW1kOXlzMV9Ua0NrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "aMYQ9CTmtAxnqATMGlILyePdounTHucZJnqFlQOejnGWmb8cPzooTNm9_Rrb-ESSqvH9CCN-_R5tvVS6fVQZ8yj-OzVapx6z5Td4_Cyx8Q8pV5BK54WrSQ10KKAngRhSxVuXFMLgD1F1Os1HXd1_CAl9joT22tgqQXpGHf1eQHK-QTJ1_ZqM0q8ru5Y75cq3I2vSMTu-QBY4UGJS-x_pf2oKM7Imp8jxLsrnyD89oz8EsIZtUeI6tlqEMulazq5G9RqWuH_m4B77Es8fJdQLsp4Thpd1xWA3UbB4QRk1X2X4yg1HqJKGMQ61EISXwMwuigWb_2OeFnqmE6O8PXpS_g", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-01 00:24:23,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346 2024-07-01 00:24:23,340:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:24:20 GMT Content-Type: application/json Content-Length: 346 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297 Replay-Nonce: eF-2qMJ9qWyHdDjQoJ_tdb6a8gwJ1rkKUiVBy6a9fIeVl8ggeHY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:01:52Z", "identifiers": [ { "type": "dns", "value": "inne.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297" } 2024-07-01 00:24:23,340:DEBUG:acme.client:Storing nonce: eF-2qMJ9qWyHdDjQoJ_tdb6a8gwJ1rkKUiVBy6a9fIeVl8ggeHY 2024-07-01 00:24:23,340:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:24:23,347:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlxV3lIZERqUW9KX3RkYjZhOGd3SjFya0tVaVZCeTZhOWZJZVZsOGdnZUhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ", "signature": "Ix3Yn_i2Q7exTiLP9jbb-n0xLezntv3-qzbHjOWo7jAOhzn3EantCobKOFTJiieAA8AiuVP6tZ6luQut1Z7PdCiEJYgmu-UlvJ0BgWPLTGi6Vg5JyRy84eRFlG33D65AfETnmqJSIVOy3MhfvmmLbqhh7rg24oFozw92VyCFZetSIb_G_QVeq8eneVC-wZflge8LMJLdjxZ5pMOZ9hNBf3SVBL8xZOEwA39Lvrz0ftxv0KYeIUcgduldY_GTy1l6su0AoYsNxeqloTfvlIBnBw75q3V3um9z2-lQ3AwXT_vT2VYaUuLOG97nZ_P9JE-ezr2k_KHSiugR3pA7uXHDUw", "payload": "" } 2024-07-01 00:24:23,497:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806 2024-07-01 00:24:23,498:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:21 GMT Content-Type: application/json Content-Length: 806 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: B-hK_YLCghkPwLxpQycLx8n0ThhMOV9vF0ztJhklAWRRbZMfTfw X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "inne.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:01:52Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A", "status": "pending", "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0" } ] } 2024-07-01 00:24:23,498:DEBUG:acme.client:Storing nonce: B-hK_YLCghkPwLxpQycLx8n0ThhMOV9vF0ztJhklAWRRbZMfTfw 2024-07-01 00:24:23,498:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:24:23,499:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl 2024-07-01 00:24:23,499:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:24:23,500:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:24:23,500:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:23,501:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:24:23,501:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:24:23,501:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:24:23,503:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:23,558:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC. 2024-07-01 00:24:23,558:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:24:23,558:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None 2024-07-01 00:24:23,568:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare self._initialized.prepare() File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare self.option_name('auth-hook'))) certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively. 2024-07-01 00:24:23,570:DEBUG:certbot._internal.plugins.selection:No candidate plugin 2024-07-01 00:24:23,570:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None 2024-07-01 00:24:23,570:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-01 00:24:23,571:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping. 2024-07-01 00:24:23,572:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly") File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins diagnose_configurator_problem("authenticator", req_auth, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem raise errors.PluginSelectionError(msg) certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration. The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.') 2024-07-01 00:24:23,622:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:24:23,738:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:24:23,739:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-01 00:24:23,740:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-01 00:24:23,746:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC. 2024-07-01 00:24:23,746:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:24:23,747:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:24:23,755:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05029610> Prep: True 2024-07-01 00:24:23,755:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05029610> and installer None 2024-07-01 00:24:23,755:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:24:23,760:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:24:23,761:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:24:23,763:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:24:24,200:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:24:24,201:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:21 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "1j3ncvtMoto": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:24:24,202:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:24:29,307:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8086_key-certbot.pem 2024-07-01 00:24:33,771:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8084_csr-certbot.pem 2024-07-01 00:24:33,772:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:24:33,772:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:24:33,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:24:33,918:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:31 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9lua5iY9cOG5X5ygQ0yOB_XsHzgrSevFX4mJnZI864BE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:24:33,918:DEBUG:acme.client:Storing nonce: eF-2qMJ9lua5iY9cOG5X5ygQ0yOB_XsHzgrSevFX4mJnZI864BE 2024-07-01 00:24:33,918:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "numeracja.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:24:33,925:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlsdWE1aVk5Y09HNVg1eWdRMHlPQl9Yc0h6Z3JTZXZGWDRtSm5aSTg2NEJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "WZGhIE8aS1JlcGQWPMRsw3KmoteaK8885t6VhiPNJv8W-e0CCWWHJrh3uQKaOoeKjCQSViCXOkCgLCkiAvlD8289UAFyZP9tnnOi1EYC4t6Tr5Wdq3wu5eHDXMWPtGypEhKe7a71erIeLIVB2B2mqkH9fJKkjEHxR-md1Om-cNXIf7-3ZnPkAYWUulmJQtOAvTtKUvLJzRZ2Xl5UhwkeuvCEtwJ6mP9mqcqFUp0Y7qbzZ15cZ1WRiGQLYbjnoF1iK5FZFlFQJoDv-P59jEtISii9bfz6ah_6VmI49sbI33NigtqqllV1GzvbRWPRIIz6ZfVN9ei7DpLIrVQsX3YwQg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-01 00:24:34,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351 2024-07-01 00:24:34,082:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:24:31 GMT Content-Type: application/json Content-Length: 351 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187 Replay-Nonce: B-hK_YLCi0LBCIlXXTy-uDIPnMIqdiiCFh8MwNq8twV1Dxu60ZE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:01Z", "identifiers": [ { "type": "dns", "value": "numeracja.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187" } 2024-07-01 00:24:34,082:DEBUG:acme.client:Storing nonce: B-hK_YLCi0LBCIlXXTy-uDIPnMIqdiiCFh8MwNq8twV1Dxu60ZE 2024-07-01 00:24:34,082:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:24:34,091:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENpMExCQ0lsWFhUeS11RElQbk1JcWRpaUNGaDhNd05xOHR3VjFEeHU2MFpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ", "signature": "o_gNOxLaubJ7d8Ad9dh7uHLg5kS4lTE7n-39dm7YC9ZloBP7I_w9wvE-SQvr7gD-TsXVw_Aw5ANieEY0E98fT_LWml1unq376P61VfNDDDccJwpcnC-0zGnAWq2ujxV1pNbcjPn6Y-ZHa1Ucavl5gcDSGHb7wsDEDeRAG-jm-2T6nU2-hT-HbVa64Sqru7zTbZ9Rdk6G9U_0wqOVbybZ-WC5-CpOSyY7xqqeZx4X8HUDPJ5qojq6moxfveETyJyYSsIsZ_KXel3bojkQ55qPgOTmEH3CCnR7gi-ymhIrmPEnff9i6scEpOVA-eSJesMUTLoOjmXI2CMdprHyfibDjA", "payload": "" } 2024-07-01 00:24:34,239:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811 2024-07-01 00:24:34,239:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:31 GMT Content-Type: application/json Content-Length: 811 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9_BHaRjifUomTryMY4VNyi2Vuv7m3Zwb0Y9YuH4uYBxs X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "numeracja.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:01Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA", "status": "pending", "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s" } ] } 2024-07-01 00:24:34,239:DEBUG:acme.client:Storing nonce: eF-2qMJ9_BHaRjifUomTryMY4VNyi2Vuv7m3Zwb0Y9YuH4uYBxs 2024-07-01 00:24:34,240:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:24:34,240:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl 2024-07-01 00:24:34,241:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:24:34,241:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:24:34,242:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:34,242:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:24:34,242:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:24:34,243:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:24:34,244:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:34,297:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:24:34,333:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:24:34,334:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-01 00:24:34,335:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-01 00:24:34,339:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC. 2024-07-01 00:24:34,340:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:24:34,340:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:24:34,345:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0503DFD0> Prep: True 2024-07-01 00:24:34,345:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0503DFD0> and installer None 2024-07-01 00:24:34,345:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:24:34,350:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:24:34,351:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:24:34,353:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:24:34,821:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:24:34,821:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:32 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "aUDrFJPFFYI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:24:34,822:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:24:40,270:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8087_key-certbot.pem 2024-07-01 00:24:44,779:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8085_csr-certbot.pem 2024-07-01 00:24:44,780:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:24:44,781:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:24:44,937:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:24:44,937:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:42 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0MieWfrFU0KJ6zfqJnciDYrpq4Gc46sp4XGwl24BrnUQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:24:44,938:DEBUG:acme.client:Storing nonce: jqVAJFJ0MieWfrFU0KJ6zfqJnciDYrpq4Gc46sp4XGwl24BrnUQ 2024-07-01 00:24:44,938:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "settings.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:24:44,944:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBNaWVXZnJGVTBLSjZ6ZnFKbmNpRFlycHE0R2M0NnNwNFhHd2wyNEJyblVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "CALGBKFzrxOrb4OuLjSHmosUN9V3VPd7n4wVLmGb0Lw2p05nN_clgIa3uUVXWO6xmxLkpSg-42skYI8xfh7zcsHZIT-CTGosUZZQt9WjxJ_A6u7RJl3tGLlF8xjIxax7fET8kwW5MhA39-fFlAauDmFjNDquYNMfH8ncEIdBYIQykH9u5HPxBeZvcRCjibF_w6meQhEKpXBvq_dBeY8y5A47me3HA_PDzlxvGU5Mjk2psaw3uzH8FoOMvLRDEb6EtADTqNDVdnYkaORYXpBFYAy66uZh6lgdZj4AL9MZWYIE6EAeO3tytWF65vshqPXBCBqLoSYBM5sx3SRbskR1QQ", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ" } 2024-07-01 00:24:45,116:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350 2024-07-01 00:24:45,117:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:24:42 GMT Content-Type: application/json Content-Length: 350 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717 Replay-Nonce: qqMiT6CkUTzA4ZzN5BLkBKNlxEBlZHnH9BOheFbqLrrZp3FMOmY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:12Z", "identifiers": [ { "type": "dns", "value": "settings.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717" } 2024-07-01 00:24:45,117:DEBUG:acme.client:Storing nonce: qqMiT6CkUTzA4ZzN5BLkBKNlxEBlZHnH9BOheFbqLrrZp3FMOmY 2024-07-01 00:24:45,118:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:24:45,124:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tVVHpBNFp6TjVCTGtCS05seEVCbFpIbkg5Qk9oZUZicUxyclpwM0ZNT21ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ", "signature": "VLZi7H78VAR_TS4aGI1p8NRFGK8ZzdQZwVj33gAsJP596f5FNzGWQ_62_5FVqo65WTay5UElE2jAG77D44U2soMsvjWEpV-3Kp5g4f3wWKiek2RVQLfpiMlWmlKCYljzHco9Cd1ytrAOo2IHO2ehvjXYrDDiLyMBrwn5HN0Bsq7xKY6eMXP2ftE0toZhqwQT3jeifM5PEdqML2-gzrwegX341ZaijjYmQpg5kdLrITrGR42GobaGKfRib29IrFFVY0BcvYECrv9qbp4aJd3UshoojZFr4AOXns3qG33_gcaOvDmsdnxT5MwUN1tUOxQ3z2ZUR_UlIymYkDGd4IJVtg", "payload": "" } 2024-07-01 00:24:45,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810 2024-07-01 00:24:45,287:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:42 GMT Content-Type: application/json Content-Length: 810 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkgiEuA-LG2gVAjXal_NirJFhU3CS6z8_8cN9wfGIF2oE X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "settings.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:12Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA", "status": "pending", "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY" } ] } 2024-07-01 00:24:45,287:DEBUG:acme.client:Storing nonce: qqMiT6CkgiEuA-LG2gVAjXal_NirJFhU3CS6z8_8cN9wfGIF2oE 2024-07-01 00:24:45,288:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:24:45,288:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl 2024-07-01 00:24:45,288:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:24:45,289:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:24:45,290:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:45,290:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:24:45,290:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:24:45,290:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:24:45,291:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:45,329:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:24:45,370:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:24:45,371:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer. 2024-07-01 00:24:45,372:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD 2024-07-01 00:24:45,377:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC. 2024-07-01 00:24:45,377:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:24:45,377:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:24:45,381:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D3CBB0> Prep: True 2024-07-01 00:24:45,381:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D3CBB0> and installer None 2024-07-01 00:24:45,381:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:24:45,387:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:24:45,387:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:24:45,390:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:24:45,867:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:24:45,868:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:43 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "b_O7XDQ5TOk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:24:45,868:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:24:50,728:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8088_key-certbot.pem 2024-07-01 00:24:55,183:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8086_csr-certbot.pem 2024-07-01 00:24:55,183:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:24:55,183:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:24:55,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:24:55,345:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:52 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6Ckl2QtgMiOytVfKONe382g22On_l2Pw74qtS9PO1Pql8Y X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:24:55,345:DEBUG:acme.client:Storing nonce: qqMiT6Ckl2QtgMiOytVfKONe382g22On_l2Pw74qtS9PO1Pql8Y 2024-07-01 00:24:55,345:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "torrent.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:24:55,352:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tsMlF0Z01pT3l0VmZLT05lMzgyZzIyT25fbDJQdzc0cXRTOVBPMVBxbDhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "uDE8PDasaMVIAjukwMHzOyJRuwv7UkP1YStfEg8VgxV1ige5dxvbO0cCAUFV8Qt9VK7Cu5qjXLQRmkS8IFSOpqdx3T8pS23wZ2hPpbkqXjOn2qn5Wn3RUL2s0TYvRv2T29knFX9kWTVu9DvTx1pbZkxi40mv_JuTZH-Wgh4RA5wnvf7965WkPBqDC0aCNpU76B9m9XuMLPTYdTSaTb4h22DrN7Z1QPAIZPLz3Pj7bccatE7gMxATaZQq_RV-QQiTeU_Ozwnaf24DjmQ8ti-1xO_9925rjidalWbzzsEQQAVqXfmjRR2vhdklsgikfHN0NHPe12HDyFLcLzp9mxNXUA", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9" } 2024-07-01 00:24:55,524:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349 2024-07-01 00:24:55,525:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:24:53 GMT Content-Type: application/json Content-Length: 349 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987 Replay-Nonce: jqVAJFJ0f447VvgpjSgmGqwFRFyNs_TVNYISzHQ5uau1ulux4QQ X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:22Z", "identifiers": [ { "type": "dns", "value": "torrent.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987" } 2024-07-01 00:24:55,525:DEBUG:acme.client:Storing nonce: jqVAJFJ0f447VvgpjSgmGqwFRFyNs_TVNYISzHQ5uau1ulux4QQ 2024-07-01 00:24:55,525:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:24:55,531:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBmNDQ3VnZncGpTZ21HcXdGUkZ5TnNfVFZOWUlTekhRNXVhdTF1bHV4NFFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ", "signature": "DiTgzkepfAXublLSbH9oHphkiGGPZRUrk_CfHToFchApYY3JJJH4aSQJWmnvP5qV3YOdvel14yOWSdCXsZ27FDxvbgRhyo8QApDdaAte_3wLldAJhYFu6XfgU9LQg7TxFPhWm1XCrZ1edHe2QKoU6X3CMnfGaPZds_tOPhpjPhERiLpHHEoQ-l_mMnG5gz5iHiwomeXcEJWRibJRCqx-7OStQlx0qH25MOBR6TUX0MvhKC1z18_1oqgvXBSh4YrteuEkuyGVIEildieW3-PyPxx8rYdBbcBHU7A4kH7TTxKGalbrgyUiwX3ldzGQuYNrrlbzpqWS2EWEblLEP3MaYQ", "payload": "" } 2024-07-01 00:24:55,696:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809 2024-07-01 00:24:55,696:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:53 GMT Content-Type: application/json Content-Length: 809 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: jqVAJFJ0rNJbC5NzL3Z-WPFrS9SPjJeUybzc73LHyIeoyXtfHmk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "torrent.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:22Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w", "status": "pending", "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0" } ] } 2024-07-01 00:24:55,697:DEBUG:acme.client:Storing nonce: jqVAJFJ0rNJbC5NzL3Z-WPFrS9SPjJeUybzc73LHyIeoyXtfHmk 2024-07-01 00:24:55,697:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:24:55,698:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl 2024-07-01 00:24:55,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:24:55,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:24:55,699:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:55,699:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:24:55,700:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:24:55,700:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:24:55,701:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:24:55,753:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:24:55,775:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:24:55,776:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer. 2024-07-01 00:24:55,777:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD 2024-07-01 00:24:55,782:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC. 2024-07-01 00:24:55,782:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:24:55,782:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:24:55,787:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x01005CB0> Prep: True 2024-07-01 00:24:55,788:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x01005CB0> and installer None 2024-07-01 00:24:55,788:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:24:55,793:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:24:55,794:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:24:55,796:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:24:56,242:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:24:56,243:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:24:53 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "OVsRZatcXGY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:24:56,243:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:25:01,133:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8089_key-certbot.pem 2024-07-01 00:25:05,681:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8087_csr-certbot.pem 2024-07-01 00:25:05,682:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:25:05,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:25:05,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:25:05,832:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:25:03 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9rkqK8UmCobmoUXXXzkcBt_pv7K1yZD8cMXXMTpdRXHk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:25:05,832:DEBUG:acme.client:Storing nonce: eF-2qMJ9rkqK8UmCobmoUXXXzkcBt_pv7K1yZD8cMXXMTpdRXHk 2024-07-01 00:25:05,833:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "tts.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:25:05,839:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlya3FLOFVtQ29ibW9VWFhYemtjQnRfcHY3SzF5WkQ4Y01YWE1UcGRSWEhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "jk_f_OpKta68oEiTS3ppZExsHn7yBRl7rHUyud0bUUKOy85ylpcnspRmquJPSbnmPJQZOcME6KspzLSglQLzjOgM1CHmSnOv5mvTA56X3e3nEyoZUE1NXuKAnBFJcp3p_WF12dIV8Bj-3k8TAmQpkifgY9w3LoihMZTNfCzCJrKQDhsNhPn_RlCNh8PmVcNHEkYdc88sNai0Qy8Rtdk6WxMlgn_IuLKLRlqINxLTzodapKvOcWh26IYC3Xc7Tt1ooEgislIWyxp4ic2dBkeOBvXy7lLHaebzbVPwM9IjbT7P8CKmRX1kAAOTacNUGgNlpTskOH-LvHv7iyp70qGtig", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-01 00:25:06,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-01 00:25:06,070:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:25:03 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727 Replay-Nonce: eF-2qMJ9zQDXc0OZyLOxLIWRG-uRE7ywf5babiTc6WIrwOcCDS8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:32Z", "identifiers": [ { "type": "dns", "value": "tts.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727" } 2024-07-01 00:25:06,070:DEBUG:acme.client:Storing nonce: eF-2qMJ9zQDXc0OZyLOxLIWRG-uRE7ywf5babiTc6WIrwOcCDS8 2024-07-01 00:25:06,070:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:25:06,076:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjl6UURYYzBPWnlMT3hMSVdSRy11UkU3eXdmNWJhYmlUYzZXSXJ3T2NDRFM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ", "signature": "jW2qrI3NLXTY4RukW3HVDC2_bSp9BE-G8zQcmBsVVcK-0Q7qolFeQw75Wmq7SKi8sxebrKQz4eIBPqi7KAv1txc4NR8SzqZ9uCDdCEuSm_9KywK1uVUkttAQyxEHWuwFLrNx4iuPrznpHkS9q7TSWZ74-EyfNJrl2m63r1CqB5L2lGO03X9B_koguDOhjOKwywBZNyO4l87Ak8PNy91imrUrUol67Iq_3y0M51WfLlNRg-TulYtUfilzMkSj99pNsR0nso-rWzwynzV6mPXsRRK-gPZYbrhW5mBXKvwdHkU_cGCcZIQx4317puOPpGu-oAqLOOn80CWSXrxmseASaA", "payload": "" } 2024-07-01 00:25:06,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805 2024-07-01 00:25:06,235:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:25:03 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: eF-2qMJ9ET9J3F6K2_zIJf5n6M-a07IjmXylJJGMVQRnf2OAVe8 X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "tts.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:32Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w", "status": "pending", "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0" } ] } 2024-07-01 00:25:06,236:DEBUG:acme.client:Storing nonce: eF-2qMJ9ET9J3F6K2_zIJf5n6M-a07IjmXylJJGMVQRnf2OAVe8 2024-07-01 00:25:06,236:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:25:06,237:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl 2024-07-01 00:25:06,237:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:25:06,237:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:25:06,238:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:25:06,238:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:25:06,239:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:25:06,239:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:25:06,240:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:25:06,289:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:25:06,336:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:25:06,338:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer. 2024-07-01 00:25:06,339:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD 2024-07-01 00:25:06,344:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC. 2024-07-01 00:25:06,344:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:25:06,344:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:25:06,350:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0503DE10> Prep: True 2024-07-01 00:25:06,351:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0503DE10> and installer None 2024-07-01 00:25:06,351:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:25:06,357:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:25:06,358:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:25:06,361:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:25:06,840:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:25:06,841:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:25:04 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "7_RV0lkMwgM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:25:06,841:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:25:11,595:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8090_key-certbot.pem 2024-07-01 00:25:16,049:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8088_csr-certbot.pem 2024-07-01 00:25:16,050:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:25:16,050:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:25:16,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:25:16,215:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:25:13 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6Ck0iHsVX4N1O1tKY0zqVfVeIrkUym_TXbH4fz-zMQqc8g X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:25:16,215:DEBUG:acme.client:Storing nonce: qqMiT6Ck0iHsVX4N1O1tKY0zqVfVeIrkUym_TXbH4fz-zMQqc8g 2024-07-01 00:25:16,216:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "vod.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:25:16,223:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2swaUhzVlg0TjFPMXRLWTB6cVZmVmVJcmtVeW1fVFhiSDRmei16TVFxYzhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "smCaCh-gj8WZVhfYiUT5jJi_ZGUfZF2I14xPH5oq0ok-E86JFFvIfqwdwlz0EPjgX0vOkiFCCAaUluPXLql-QIEVyG1JrhrCebcy-OFjc6DM1Lgm-v-Z7NNaNE62ejbdmiAzN_fZkdeugJtB6XRPcDDHeDBVKltHkGromOVm6cTy1zn65Ditaj0Th9SdYGjMctSSvgIr9eBfp0HvIA3NGyWJRYqwGbp-j0wipirHMxLFU4Wb6VGxLQ0c33cLWhgLyWbOus9Caq2opc7CU0OlLNQRepzstb_nZBg4XBkI9i0iLMenKKgthDgdkxGAOLvamx3Msln93kkuQ11JIAJVqw", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-01 00:25:16,395:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-01 00:25:16,395:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:25:13 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847 Replay-Nonce: jqVAJFJ0llWxu1zBhKg74xhbDjgQCWD1xMl-NVEu3tPnklNDDlU X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:42Z", "identifiers": [ { "type": "dns", "value": "vod.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847" } 2024-07-01 00:25:16,396:DEBUG:acme.client:Storing nonce: jqVAJFJ0llWxu1zBhKg74xhbDjgQCWD1xMl-NVEu3tPnklNDDlU 2024-07-01 00:25:16,396:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:25:16,401:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBsbFd4dTF6QmhLZzc0eGhiRGpnUUNXRDF4TWwtTlZFdTN0UG5rbE5ERGxVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ", "signature": "XrtADPnmzNz_L1K_K-ZUKtA5lFUax1v4ZTlcC7xwUxnLEU-HFMyYA-WG6YYSGnqcndkDCDPVod3PN_2ukd4_CpwJ8ZJHFLjteYqkQIhGl_wAGXO9jHs5gm4Rd0_NM7QwAo8jkFyfaozkRGUMYmtTnwf5tKYSSthCBK8FAjvd8z1CpS-_ZDnjATedzqTZgGsEotcxsbE44Rd_MJrprfhT18OREcKjOUtSyvvRAYcAr-9VL5yVRWxJlNHKJRmyc1GkZ03uz3H5Rw5nBS65wQAAVf7MS9wsflitOjwTMz3jh2OyhiIQcDJzgwW2GUneVR5gY6t7oTzBzrEsPgwbBGd6hw", "payload": "" } 2024-07-01 00:25:16,566:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805 2024-07-01 00:25:16,567:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:25:14 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6CkB3NHDlrOluWQIuMyIvxr9_roxB8MCVtMLKZsqcWry4Q X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "vod.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:42Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg", "status": "pending", "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q" } ] } 2024-07-01 00:25:16,567:DEBUG:acme.client:Storing nonce: qqMiT6CkB3NHDlrOluWQIuMyIvxr9_roxB8MCVtMLKZsqcWry4Q 2024-07-01 00:25:16,568:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:25:16,568:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl 2024-07-01 00:25:16,569:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:25:16,569:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:25:16,570:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:25:16,570:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:25:16,570:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:25:16,570:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:25:16,572:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:25:16,625:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80 2024-07-01 00:25:16,646:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503 2024-07-01 00:25:16,647:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer. 2024-07-01 00:25:16,648:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD 2024-07-01 00:25:16,662:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC. 2024-07-01 00:25:16,662:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing... 2024-07-01 00:25:16,662:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None 2024-07-01 00:25:16,667:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone Description: Spin up a temporary webserver Interfaces: IAuthenticator, IPlugin Entry point: standalone = certbot._internal.plugins.standalone:Authenticator Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05029A30> Prep: True 2024-07-01 00:25:16,668:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05029A30> and installer None 2024-07-01 00:25:16,668:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None 2024-07-01 00:25:16,673:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))> 2024-07-01 00:25:16,674:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory. 2024-07-01 00:25:16,676:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443 2024-07-01 00:25:17,153:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746 2024-07-01 00:25:17,154:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:25:14 GMT Content-Type: application/json Content-Length: 746 Connection: keep-alive Cache-Control: public, max-age=0, no-cache X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "gUFa8YjHBm0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417", "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change", "meta": { "caaIdentities": [ "letsencrypt.org" ], "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf", "website": "https://letsencrypt.org" }, "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct", "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce", "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order", "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo", "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert" } 2024-07-01 00:25:17,155:INFO:certbot._internal.main:Renewing an existing certificate 2024-07-01 00:25:21,781:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8091_key-certbot.pem 2024-07-01 00:25:26,232:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8089_csr-certbot.pem 2024-07-01 00:25:26,232:DEBUG:acme.client:Requesting fresh nonce 2024-07-01 00:25:26,232:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce. 2024-07-01 00:25:26,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0 2024-07-01 00:25:26,393:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:25:23 GMT Connection: keep-alive Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6Ckwao_-oGXLs3XZ1626rfpq0hI1ipTLH9Dzgjy6a4q9Sk X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 2024-07-01 00:25:26,393:DEBUG:acme.client:Storing nonce: qqMiT6Ckwao_-oGXLs3XZ1626rfpq0hI1ipTLH9Dzgjy6a4q9Sk 2024-07-01 00:25:26,393:DEBUG:acme.client:JWS payload: b'{\n "identifiers": [\n {\n "type": "dns",\n "value": "xxx.daisuke-design.pl"\n }\n ]\n}' 2024-07-01 00:25:26,399:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t3YW9fLW9HWExzM1haMTYyNnJmcHEwaEkxaXBUTEg5RHpnank2YTRxOVNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ", "signature": "kiqTOKn7Wy9egFtV4iZNsDb6zw61YcD22FwpKl5iswzSW_Praq79ApsPIudiRsWEUgUEpxuUa-c5nQcewPcBHgoq9mWPipRK6_2sshSrSkCKlrMFaBJ_XMYsNHNL7eoTOzUAibabPfooT8ZyiE2ovIYd_7M9XIjXH-5EZSNUemBv8UbhplR-iP-H9pQQmfDs1dyvOcKEYToYHfAaduPq1aP_lex7s-G7aw547SxslNaINeP7ptcCtKPhshLObwSnxbzUrBgDAn7SGPBXOuF8Os8_4c0dUgoQuhNCVUJR_uFRpHTiRSVSIlqAOazsh3x8Owgr-Vw2rZzswpCYdF-hDg", "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0" } 2024-07-01 00:25:26,576:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345 2024-07-01 00:25:26,576:DEBUG:acme.client:Received response: HTTP 201 Server: nginx Date: Sun, 30 Jun 2024 22:25:24 GMT Content-Type: application/json Content-Length: 345 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047 Replay-Nonce: qqMiT6CkBmfMd5gIPjt1gEcsxG3ZHVtgmJVb4jMQfoYJ-_o2MlY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "status": "pending", "expires": "2024-07-03T08:02:53Z", "identifiers": [ { "type": "dns", "value": "xxx.daisuke-design.pl" } ], "authorizations": [ "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647" ], "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047" } 2024-07-01 00:25:26,576:DEBUG:acme.client:Storing nonce: qqMiT6CkBmfMd5gIPjt1gEcsxG3ZHVtgmJVb4jMQfoYJ-_o2MlY 2024-07-01 00:25:26,577:DEBUG:acme.client:JWS payload: b'' 2024-07-01 00:25:26,583:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647: { "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tCbWZNZDVnSVBqdDFnRWNzeEczWkhWdGdtSlZiNGpNUWZvWUotX28yTWxZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ", "signature": "q7wwlSpJ3w8v2FgxqjJ1LacYSS1Xp3l_Dv3BzJTWYnpRKGU7y7grlyOt4T_W6D_I1avaa7kWvokxQSmHPfu1HQBPQHpyjh1SU4sD6W4M1EJIUrUG39gdAhHyATQJ7PIXuvU38Oylv9Xh2P3T3P5GxFVNDPmlSKP9VAFZhpMWVuO-i_bAeRaspIg4VXPnbe-RcBy5eyEVBcvRTfyWGquENydYq4dBf2vJ0sbBw7kBtVqD8I7Wl_Dwz8E0SuFkm72kDlpgeJIFQjbBir28CqtmHQhcxRg2tH7IY6O57MSt2-uPrtsqwpJKISXlaUZXG-giGPXf2Kc15lVMOlvlFyIsfw", "payload": "" } 2024-07-01 00:25:26,749:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805 2024-07-01 00:25:26,750:DEBUG:acme.client:Received response: HTTP 200 Server: nginx Date: Sun, 30 Jun 2024 22:25:24 GMT Content-Type: application/json Content-Length: 805 Connection: keep-alive Boulder-Requester: 92790611 Cache-Control: public, max-age=0, no-cache Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index" Replay-Nonce: qqMiT6Ck6PLx_YAr9DoDAG6DKHUarDTsYFmA0V5oXfUXUDSNPBY X-Frame-Options: DENY Strict-Transport-Security: max-age=604800 { "identifier": { "type": "dns", "value": "xxx.daisuke-design.pl" }, "status": "pending", "expires": "2024-07-03T08:02:53Z", "challenges": [ { "type": "http-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "dns-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" }, { "type": "tls-alpn-01", "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ", "status": "pending", "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk" } ] } 2024-07-01 00:25:26,750:DEBUG:acme.client:Storing nonce: qqMiT6Ck6PLx_YAr9DoDAG6DKHUarDTsYFmA0V5oXfUXUDSNPBY 2024-07-01 00:25:26,751:INFO:certbot._internal.auth_handler:Performing the following challenges: 2024-07-01 00:25:26,751:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl 2024-07-01 00:25:26,752:DEBUG:acme.standalone:Failed to bind to :80 using IPv6 2024-07-01 00:25:26,752:DEBUG:acme.standalone:Failed to bind to :80 using IPv4 2024-07-01 00:25:26,753:DEBUG:certbot._internal.error_handler:Encountered exception: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:25:26,753:DEBUG:certbot._internal.error_handler:Calling registered functions 2024-07-01 00:25:26,753:INFO:certbot._internal.auth_handler:Cleaning up challenges 2024-07-01 00:25:26,753:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping. 2024-07-01 00:25:26,755:DEBUG:certbot._internal.renewal:Traceback was: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run address, self.http_01_resources) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__ BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs) File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__ raise socket.error("Could not bind to IPv4 or IPv6.") OSError: Could not bind to IPv4 or IPv6. During handling of the above exception, another exception occurred: Traceback (most recent call last): File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request main.renew_cert(lineage_config, plugins, renewal_candidate) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert renewal.renew_cert(config, domains, le_client, lineage) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations authzr = self.auth_handler.handle_authorizations(orderr, best_effort) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations resps = self.auth.perform(achalls) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp> return [self._try_perform_single(achall) for achall in achalls] File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single _handle_perform_error(error) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error raise error File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single return self._perform_single(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single servers, response = self._perform_http_01(achall) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01 servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run raise errors.StandaloneBindError(error, port) certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6. 2024-07-01 00:25:26,755:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed: 2024-07-01 00:25:26,755:ERROR:certbot._internal.renewal: C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\merkat.pl\fullchain.pem (failure) C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure) C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure) 2024-07-01 00:25:26,757:DEBUG:certbot._internal.log:Exiting abnormally: Traceback (most recent call last): File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module> sys.exit(main()) File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main return internal_main.main(cli_args) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main return config.func(config, plugins) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew renewal.handle_renewal_request(config) File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request len(renew_failures), len(parse_failures))) certbot.errors.Error: 14 renew failure(s), 0 parse failure(s) 2024-07-01 00:25:26,759:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)